Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems ....Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems and failures. This project builds on results from our current collaboration - a new method for modelling, analysis and defect detection for the requirements of large-scale systems. We will develop and scale-up to industry strength, simpler, more powerful, strategies for analysing, designing and providing the high level of assurance required.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Investigation of a Dynamic Collaborative Framework for Multi-Modal Devices. Modern business and society increasingly call for agility through the rapid formation of groups and collaboration of individuals. Mobile computing devices have the potential to enable this collaboration. However this is currently unrealised; software is not keeping up with hardware. This project aims to investigate techniques and software tools to provide an adaptive framework for multimedia-rich applications, which seam ....Investigation of a Dynamic Collaborative Framework for Multi-Modal Devices. Modern business and society increasingly call for agility through the rapid formation of groups and collaboration of individuals. Mobile computing devices have the potential to enable this collaboration. However this is currently unrealised; software is not keeping up with hardware. This project aims to investigate techniques and software tools to provide an adaptive framework for multimedia-rich applications, which seamlessly support collaboration through multi-modal communications between heterogenous mobile devices. This combination of multimedia, smart devices and advanced communications has the potential to revolutionise many key industries by making information available and manipulable in new and better ways.Read moreRead less
Effective software process improvement in a large-scale defence contracting environment. Most organisations struggle to consistently develop high-quality software on schedule and within budget. Continuing changes in technologies and customer expectations complicate this challenge. Software process improvement frameworks aim to guide organisations towards best practice. This project will assess practical experience with individual software process improvement frameworks in a large-scale defence c ....Effective software process improvement in a large-scale defence contracting environment. Most organisations struggle to consistently develop high-quality software on schedule and within budget. Continuing changes in technologies and customer expectations complicate this challenge. Software process improvement frameworks aim to guide organisations towards best practice. This project will assess practical experience with individual software process improvement frameworks in a large-scale defence contracting environment, with the goal of developing an effective strategy for integrating them. The outcomes will include documented experience with specific process improvement frameworks and a strategy for an overall framework that combines them.Read moreRead less
Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlyin ....Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlying biological and biomedical processes, bringing sustainable discovery of new relationships and variations within the data. The project aims to support new approaches to medical diagnosis and treatment, and offer crucial lessons to address the broader challenge of understanding large, complex data sets.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
New information access technologies for people with intellectual disability. New information access technologies for people with intellectual disability. This project aims to co-design a social, interactive and visual internet search interface for people with intellectual disability. Enabling choice and independence is key to the new National Disability Insurance Scheme, but people with intellectual disability are effectively excluded from much of the Web. This project will investigate ways to a ....New information access technologies for people with intellectual disability. New information access technologies for people with intellectual disability. This project aims to co-design a social, interactive and visual internet search interface for people with intellectual disability. Enabling choice and independence is key to the new National Disability Insurance Scheme, but people with intellectual disability are effectively excluded from much of the Web. This project will investigate ways to access and provide information using technologies such as interactive avatars, virtual worlds and trusted social support. New interfaces will enable people with intellectual disability to inform themselves, make choices and foster their social inclusion. Expected outcomes are new search interface technology, a theoretical framework and new Web accessibility guidelines.Read moreRead less
Formal modelling and analysis of software requirements for air traffic management systems for improved integrity assurance. This project will significantly reduce the time and cost of developing software for critical applications such as aviation and air traffic management. As well as improving the trustworthiness of safety-critical computer-based systems, this project will also enable system improvements to be deployed faster and more reliably.
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less